You are on page 1of 9

Digital Signatures –

Best Practice for


e-Business Transactions

© Copyright 2001-2003 Entrust. All rights reserved.


Entrust is a registered trademark of Entrust, Inc. in the United States and certain
other countries. Entrust is a registered trademark of Entrust Limited in Canada.
All other Entrust product names and service names are trademarks or registered
trademarks of Entrust, Inc or Entrust Limited. All other company and product names
are trademarks or registered trademarks of their respective owners.

© Copyright 2001-2003 Entrust. All rights reserved.

About Entrust

Entrust, Inc. [Nasdaq: ENTU] is a world leader in securing digital identities and
information, enabling businesses and governments to transform the way they
conduct online transactions and manage relationships with customers, partners
and employees. Entrust's solutions promote a proactive approach to security that
provides accountability and privacy to online transactions and information. Over
1,200 enterprises and government agencies in more than 50 countries use Entrust's
portfolio of security software solutions that integrate into the broad range of
applications organizations use today to leverage the Internet and enterprise
networks. For more information, please visit www.entrust.com.
Digital Signatures and e-Business
New business opportunities have emerged legislation on privacy and digital signatures,
as paper-based transaction systems are as well as industry-specific regulations for
moved online. Yet the road to an economy selected broad verticals. Examples of such
where the vast majority of transactions are legislation in the United States alone
electronic is not without concerns. These include the Electronic Signatures in Global
include knowing whom you are dealing and National Commerce Act (e-Sign), the
with (identification), who is authorized to Uniform Electronic Transactions Act (UETA),
access what information (entitlements), the Health Insurance Portability and
and how individuals will be held Accountability Act (HIPAA), Gramm-Leach-
accountable for their online commitments Bliley (GLB) Financial Services Act and the
(digital accountability). Government Paperwork Elimination Act
(GPEA). These types of regulations and
Digital signatures powered by public-key legislation have created not only
infrastructure (PKI) technology, are widely compliance challenges, but also
recognized as best practice for ensuring opportunities for competitive advantage
digital accountability for electronic over slower-moving rivals.
transactions. Digital signatures are the
most effective, secure, and easy-to- The broad adoption of digital signatures
implement method of providing built on PKI foundations is now generally
accountability while enabling electronic acknowledged. The infrastructure build-
transactions. This paper will help readers out is currently underway, and the scale is
develop a better understanding of what enormous - for example, the U.S.
digital signatures are, their role as an Department of Defense has requested
enabling tool in e-business, and how they $700 million in funding from fiscal year
can be used to advantage in light of recent 2000 through 2005 solely for PKI
legislative changes. development [Information Security -
Advances and Remaining Challenges to
Digital signatures deliver e-business Adoption of Public Key Infrastructure
advantage Technology, GAO, February 2001].

Aside from enabling new business processes, Digital signatures were first conceived of in
moving existing transaction systems online 1976. Now 25 years later, wide-scale
offers compelling advantages. These include acceptance of PKI-based enhanced
dramatic gains in: security solutions includes
• efficiency legislative support, with essentially all
• lower costs modern economies having existing or
• stronger partner/customer relationships pending legislation giving digital signatures
• personalization legal recognition. Leading organizations
• tighter integration of supply chains using digital signatures have raised global
awareness of their vast potential.
Rather than visiting a Web site, filling out
an application form, then printing, signing, Paper signatures
and sending a paper copy by courier or fax,
the use of digital signatures allows the final We are all familiar with paper signatures,
step in an otherwise online process to by which we mean handwritten signatures
be automated. The fundamental on paper documents. Aside from legal and
technology that enables security and contractual issues, the primary
characteristics of a paper signature are:
accountability for electronic transactions is
the digital signature.
1. it is intended to be associated with a
particular individual; and
In today's business environment, 2. it generally denotes a commitment
organizations must be aware of security related to a particular document, with
and privacy issues, including regulatory the exact meaning depending on
issues such as national and international context.

3
Though far from perfect, paper signatures and all available evidence beyond a
serve surprisingly well in many parts of the physical signature itself.
world as the basis for business and legal
transactions. This is due not to the In summary, societies have learned to use
inherent features of paper signatures, but paper signatures in circumstances in which
rather to accompanying processes, a physical marking on a paper document,
supplemental contracts, and the overall augmented by sufficient controls and
context surrounding acts of signing. context, provides sufficient recallable
Various customs of witnessing, public evidence of a commitment related to that
ceremony, and evidence have emerged document by the marking party. The
over time, in large part aimed at increasing evidence is important in order to
the chances of accurately reconstructing reconstruct circumstances, in the rare case
events should a dispute arise later. of later disputes.

Paper signatures in and of themselves are Digital signatures


generally not meaningful. In fact, in many
cases a witnessed "X" serves equally well. A digital signature is the term used for
If extracted through coercion, trickery or marking or signing an electronic document,
forgery, almost all societies will find a paper by a process meant to be analogous to
signature legally non-binding. The use and paper signatures, but which makes use of a
interpretation of a paper signature are technology known as public-key
typically defined by culture and context. cryptography. The analogy to paper
State laws evolve to define reasonable signatures is helpful, though not precise.
default terms, both in the absence of Clearly paper signatures cannot be applied
explicit contracts and in the presence of to documents that remain in electronic form.
contracts with ambiguous terms. Common More significantly, additional security
conditions necessary for a party to be properties are required of signatures in the
legally bound by a signature include the electronic world. This is because the
signature mark representing a desire to be probability of disputes rises dramatically for
bound to a well-defined commitment, the electronic transactions without face-to-face
mark being made of free will, and the mark meetings, and in the presence of potentially
being an act of the party to be bound (or a undetectable modifications to electronic
duly authorized deputy of that party). documents. Digital signatures address both
of these concerns, and offer far more
A popular myth is that a paper signature inherent security than paper signatures.
can be easily traced to a particular Compared to all other forms of signatures,
individual. In practice, this turns out to be digital signatures are by far the most easily
difficult. Most office workers are unable to verified and the most reliable with respect to
recognize the paper signature of a providing document integrity.
colleague, or of the company officers that
sign their expense checks. Nonetheless, This is not to say that digital signatures
this is not a problem because in most cases cannot be misused. If poorly implemented
paper signatures are effectively a formality; or not supported by appropriate
their subsequent verification is rare. The procedures and processes, they are no
reason paper signatures seem to work so
more reliable than paper signatures or
well is that over time, societies learn to
corporate seals under similar conditions.
discontinue their use, or support them by
(This is a point which critics of digital
additional means (e.g. witnesses, notaries,
corporate letterhead, seals), in situations signatures appear to miss - the fact that
where it has been difficult to resolve paper signatures, without the procedures
disputes. The end result is that signatures and processes generally accompanying
are only rarely called into dispute, and them, do not provide any inherent security,
there is confidence that the rare cases can and moreover have been subject to forgery
be resolved through special procedures that since their first use.) It is, therefore,
rely on context, collective memory, and any insightful to take a few minutes to
4
understand why digital signatures provide a Creating and verifying digital
far more secure basis for contracting and signatures
commitments than paper signatures, and
offer the only viable solution to providing To understand why a digital signature is
reliable evidence of commitments in an more secure than alternate signature forms
online world. on electronic data, it is necessary to
understand how a digital signature is
A given individual's paper signature is created. A digital signature can be thought
essentially identical regardless of the of as a numerical value, represented as a
document being signed. For this reason, a sequence of characters, and computed
threat related to paper signatures is a cut- using a mathematical formula. The formula
and-paste attack from one physical depends on two inputs: the sequence of
document to another. This risk is usually characters representing the electronic data
small because typically such an act would to be signed, and a secret number referred
leave physical evidence of the misdeed. to as a signature private key, associated
However, the point worth noting is that with the signing party and which only that
such an attack is not possible for digital party has access to. (A matching public
signatures, because the digital signature of key, which can be published for everyone
George W. Bush differs significantly with to see like a phone number in a phone
each different document digitally signed by directory, allows signature verification.) The
Mr. Bush, even if the document varies by resulting computed value, representing the
only a single character or bit. Yet the digital signature, is then attached to the
digital signature can be easily associated electronic data just as a paper signature
back to the correct individual. This is becomes part of a paper document. This
possible through the elegance of public-key results in two critical properties:
cryptography.
1. The digital signature can be uniquely
The important summary points are that, associated with the exact document
when properly implemented and supported signed, because the first input is the
by the robust foundation of a PKI: precise sequence of characters
representing that data.
1. digital signatures are to electronic 2. The signature can be uniquely
documents what paper signatures are associated with the signing individual,
to paper documents; because the second input is the private
2. digital signatures provide trustworthy key that only that individual controls.
evidence of the identity of the signing
party (identification);
3. digital signatures are not subject to
being copied to (or forged from) other
Paper Digital
documents; Property Signatures Signatures
4. digital signatures ensure that a signed
Can be applied to electronic
document cannot later be modified to documents and transactions No Yes
the advantage of one party (if the
Signature verification can
original is modified, the verification be automated No Yes
process detects this); and
Signature makes it possible
5. digital signatures already have a legal to detect alterations to the
footing equal with paper signatures in detect No Yes
many countries. Can be used to signify a
commitment to a contract
In addition, the exact time of signing for a or document Yes Yes
digital signature can be recorded more reliably Can be augmented by
than that for paper signatures, through the use of a witness to the
use of a trusted time-stamping server or signature process Yes Yes
service. With digital signatures, witnessing Recognized by legislation Yes Yes
and notarization are naturally facilitated more
efficiently and conveniently. Table 1 compares Table 1. Comparison of paper and digital
several important properties of paper signature properties.
signatures and digital signatures. 5
1 Digital Signature Creation 2 Send Message 3 Digital Signature Verification
Original
Message Original Message

Create Digital Signature


Signature
Digital Signature

Verify
Original Signature
Message
(plain text) Originator’s
Public Key
Originator’s
Private Key Yes (valid signature) or
No (invalid signature)

Figure 1. Digital Signature Creation and Verification

Verifying the authenticity of a digital Digital signatures are a fundamental part of


signature can also be viewed as a process an overall plan for digital accountability of
relying on a formula. Here the formula electronic transactions. Such a plan
depends on three inputs: the sequence of requires appropriate security policies,
characters representing the supposedly practices and procedures as is customary in
originally signed electronic data, the public commercial IT environments. Important
key of the signing party, and the value elements specifically relevant to the digital
representing the supposedly authentic digital signature process include simple user
signature. The formula produces as output a interfaces, so that users understand the
simple answer: yes or no. Yes signifies that significance of their actions. For signatures
the digital signature is indeed an authentic not only to provide data integrity, but also
digital signature on the presented electronic to capture user intentions to make
data, and associated with the party linked to commitments, the digital signature process
the public key used. This process is may include:
presented in Figure 1.
a) capturing the entire context of the
A public-key certificate generally provides electronic transaction or document,
the linkage between the signing party and and precisely what the signer is
the public key. In essentially all committing to;
commercially relevant digital signature b) ensuring that the data displayed to the
systems, the public-key certificate support user accurately reflects the data to be
is provided through a PKI. Entrust digitally signed;
pioneered this architectural c) requiring the user to signal an
technology with the introduction of the understanding of the commitment
world's first commercially available PKI being made, and a desire to be bound
product in 1994. to this;
d) authenticating the user in order that
Digital signatures, digital the user's private key becomes
accountability, and transaction available to the signing device;
e) computing the signature based on the
evidence signer's private key and the data being
signed;
The stock price of Emulex Corporation f) a timestamp server optionally
plunged over 60% in August 2000, appending a time-date field to the data
following a fake press release. This could and signer's signature and then
easily have been avoided by using digital signing; and
signatures to confirm the source and g) forwarding the signed transaction for
integrity of the release. Instead, the fragility processing, storage, or subsequent
and insecurity of current information verification.
networks was highlighted. 6
A computer or handheld device generates the system, including non-technology
signature for the signing party, after that components such as security policies,
party indicates consent to the signing procedural processes, and human-machine
operation, and provides appropriate interfaces.
authentication to the device. The device
typically stores the private key in secure Digital signatures - best practice for
storage. Digital signatures can be made very electronic signatures
easy to use, and largely transparent to the
sender and recipient. As with any good An electronic signature is any form of
infrastructure, detailed system information marking that might be used to represent the
should only become visible if a problem arises equivalent of a paper signature, for the case
(e.g. if signature verification fails, it is because of an electronic document. As discussed
a document has been tampered with). earlier, digital signatures, based on public-key
cryptography and supported by PKIs, are one
The term non-repudiation often arises in type of electronic signature. Other types of
technical discussions about digital signatures. electronic signatures have been proposed.
Unfortunately, because there is no universally One example is digitized signatures -
accepted definition of this term, its use scanned images of paper signatures that are
generally creates a great deal of confusion then simply attached as graphical
and misunderstanding. We prefer to define representations (bit-map images) at the
and use the concept of digital verification. bottom of electronic documents. Another
The main question is whether the recorded possibility is scripted-font signatures - simply
evidence related to a transaction is sufficient attaching the name of a signing party in a
to establish, at a later point, all-important special scripted computer font, giving the
details of the transaction. The evidence may likeness of a paper signature but including
be needed to resolve later disputes, including nothing characteristic of the signing party.
a party attempting to escape commitments or Many other technologies, including smart
deny involvement. All parties must be held cards, biometrics, and passwords, are
accountable for their commitments. confused as substitutes for digital signatures;
Verification requires the generation and the majority of these are in fact
maintenance of appropriate evidence (e.g. complementary to digital signatures, rather
transaction records serving as electronic than substitutes.
receipts), provides a high degree of
confidence that the evidence is accurate and It is clear that scripted-font signatures offer no
that any subsequent manipulation or forgery security on their own (say in the absence of
can be detected. witnesses), as it would be very easy for anyone
to enter the name George W. Bush at the
Ultimately, whether the available evidence is bottom of a message, in a particular computer
sufficient depends on the situation and the font. Digitized signatures similarly offer little
authorities that must be convinced - a security - one could obtain a signature image
corporate manager, a business partner, an from a copy of an electronic or paper
independent arbiter, or a court judge and document, and an electronic representation
jury. The use of products and services that could be easily copied and transferred to any
provide high-trust digital signatures, together other document. As discussed earlier, such
with a set of appropriately enforced security cut-and-paste fraud is also possible with paper
policies, provides best practice evidence. In signatures, but in the paper world it leaves
most cases, this will be better than all physical evidence and is therefore less of a risk.
available alternatives including paper
signatures. Such attacks, which are possible with many
weaker forms of electronic signatures, are not
Digital verification ultimately does not possible with digital signatures. A main
depend on any single feature, such as the use reason is that, as discussed earlier, a digital
of cryptographic hardware or the location signature varies with each transaction. If a
where a private key is generated. Overall single message word or bit is altered after a
accountability depends on all aspects of a document is digitally signed, the signature
7
verification process will detect this. This is any new legislation. It is therefore instructive
very important, because there is no point in to examine how the business community
verifying the identity of a signer if you cannot previously approached a similar situation,
detect whether someone else has altered the involving the emergence of electronic data
document thereafter. interchange (EDI) systems in the 1980s.

It is also important to note that simply EDI systems automated the purchase of
obtaining the consent of a user - for example goods through the electronic exchange of
by having the user click on an "I accept" information such as purchase order requests,
button - does not provide tangible evidence, quotes, acknowledgements, and invoices.
at a later point in time, that such consent was They were set up to allow automated
actually obtained. An online brokerage would processing of standardized messages. Trading
be hard-pressed to prove to an arbiter, at a partners reached common technical
later point in time, that the button was understandings as to how exchanged
located in an appropriate place, in an messages should be interpreted.
appropriate overall context, six months after a Nonetheless, because there remained a legal
disputed customer transaction took place. requirement of a "signed writing", it was
Indeed, recreating the environment of a past unclear how a court would interpret an EDI
user transaction is extremely challenging, as message exchange should a dispute arise. To
the design of Web sites and online forms reduce uncertainty regarding possible legal
changes frequently. This highlights the interpretations, EDI trading partner
difference between obtaining user consent, agreements were created. These were signed
and recording evidence that such consent was traditional contracts specifying rules for how
obtained. While passwords are in common exchanged messages should be interpreted,
use for identification and entitling access and the legal significance the parties intended
to accounts, passwords alone are of little help these to have. The contracts would be
in generating evidence generation such as available to a court should any disputes arise,
easily verifiable digital receipts, that is, for example with respect to fraud. The
reliable electronic transaction records expectation was that a court would respect
replacing paper receipts. Best practice for the desired interpretations as set out in the
securing digital receipts is through digital contract.
signatures.
The volume of EDI transactions over the past
Digital signatures, when appropriately 20 years has been huge. Interestingly, few or
implemented in accordance with standard no reported cases of EDI trading partner
practice, provide more security than paper disputes are known. While a single reason for
signatures or any form of electronic signature. this is difficult to establish, the use of
They are the only known means for reliably contracts to remove uncertainty and clarify
binding a signature to electronic data in a expectations appears to work very well.
manner that is both secure and easily Consequently, the use of contractual
verifiable - a property that is absolutely agreements offers an attractive solution for
fundamental to e-business. They also offer any similar concerns in particular transaction
the ideal means for guaranteeing the integrity systems intending to use digital signatures.
of audit trails and online storage. As a result,
digital signatures are equated with best Open vs. self-governed systems, and
practice for digital verification. the relevance of digital signature
legislation
Contractual agreements vs.
legislation-based business transaction Business transaction systems can be divided
systems into open systems and self-governed systems.
In open systems, such as most cash-based
Although E-Sign and related legislation retail sales, the rules of operation exist
provide an important framework for digital without special negotiation or membership.
signatures, some degree of uncertainty is For example, in many countries rules
inevitable regarding a court's interpretation of governing the sale of goods include consumer
8
protection legislation. Open systems provide Entrust provides leadership with
ground rules and a degree of comfort that is digital signature solutions
generally welcome in the case of strangers
doing business with strangers. Entrust has unique expertise and a long
history of helping organizations integrate
Self-governed systems, in contrast, are based digital signatures into their business operation
on some form of membership or semi-closed across a broad range of applications including
community. A relationship is formed based on e-mail, Web-based applications, electronic
voluntary agreements, often bilateral. Parties forms, and customer applications. Global
then transact business based on this 2000 organizations have been using Entrust
relationship. The agreements may include technology to power digital signatures since
allocation of risks between the parties, the 1994.
definition of rights and obligations, and terms
regarding how disputes should be resolved. Proven expertise and enhanced
By this means, any uncertainties as to how a security solutions from Entrust,
court might interpret existing laws may be combined with partner solutions,
reduced, as in the case of EDI trading partner can help you meet the best-practice
agreements. security and privacy expectations of your
employees, customers, partners, and
Electronic signature legislation has the suppliers. We can also help you interpret the
greatest impact on open systems. However, national and international regulatory
the majority of commercial electronic compliance requirements of existing and
transaction systems can be realized as self- emerging privacy and digital signature
governed systems, including intra-business, legislation.
business-to-business (B2B), and e-commerce
transaction systems in general. For more information on digital signatures,
visit the Entrust Resource Center at
Enabling legislation and compliance http://www.entrust.com/digitalsig/index.htm
issues related to digital signatures and
privacy Entrust®, Inc. (Nasdaq: ENTU) is
a leading global provider of enhanced
Digital signatures enable business innovation Internet security solutions and services that
by allowing paper processes to be moved make it safe to do business and complete
online, while ensuring continued transactions over the Internet. Entrust has the
accountability. Legislation related to digital industry's broadest set of indentification,
signatures such as the Electronic Signatures in entitlements, verification, privacy and security
Global and National Commerce Act (E-Sign) management capabilities. More than 1,200
and the Uniform Electronic Transactions Act major corporations, service providers, financial
(UETA) are important as they remove institutions and government agencies in more
uncertainties regarding legal interpretations of than 40 countries rely on the privacy, security
online transaction systems. Privacy legislation and trust provided through Entrust's portfolio
is closely related, as digital signatures play an of award-winning technologies. For more
important role in identification, information, visit www.entrust.com.
entitlements, and verification - all of these
being fundamental to online privacy.
Important sector-specific examples of
legislation include the Health Insurance
Portability and Accountability Act (HIPAA)
and the Gramm-Leach-Bliley (GLB) Financial
Services Act.

You might also like